Remove latest-commentary
article thumbnail

COVID-19: Latest Security News & Commentary

Dark Reading

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

140
140
article thumbnail

Latest Security News & Commentary about COVID-19

Dark Reading

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Adversarial ML Attack that Secretly Gives a Language Model a Point of View

Schneier on Security

Here’s the latest: a training-time attack that forces the model to exhibit a point of view: Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures.” Machine learning security is extraordinarily difficult because the attacks are so varied—and it seems that each new one is weirder than the next.

Media 225
article thumbnail

Security Roundup April 2024

BH Consulting

The big picture commentary tends to veer between positive and negative takes on where this is all going. Every month we send out the latest cybersecurity and data protection news, trends and advice from around the globe. SANS Institute tries to balance the potential for innovation with the possibility of risk.

article thumbnail

Top 8 Cybersecurity Podcasts of 2021

eSecurity Planet

Depending on your interests, you can catch up on the latest news and hear analysis from experts in the field, or you can take a deep-dive into a major cybersecurity story or concept. In this podcast, Dave Bittner summarizes the latest stories you need to know with clear and concise reporting. The best part? Hacking Humans.

article thumbnail

Research Examines WormGPT, an AI Cybercrime Tool Used in BEC Attacks

SecureWorld News

In its latest research , SlashNext—a provider of multi-channel phishing and human hacking solutions—delves into the emerging use of generative AI, including OpenAI's ChatGPT, and the cybercrime tool WormGPT, in Business Email Compromise (BEC) attacks.

article thumbnail

Presenting the Security Outcomes Study, Volume 2

Cisco Security

Our latest cybersecurity research study suggests that this is not only true but is also a tangible reality for organizations that choose to follow some practical steps. What if you could build a successful, world-class security program with just five practices? . And as those blogs become available, they’ll be linked below.